From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id B0355C8303F for ; Wed, 2 Jul 2025 10:57:35 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 48FED900002; Wed, 2 Jul 2025 06:57:35 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 43F5D8E0001; Wed, 2 Jul 2025 06:57:35 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 308BB900002; Wed, 2 Jul 2025 06:57:35 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0014.hostedemail.com [216.40.44.14]) by kanga.kvack.org (Postfix) with ESMTP id 197EC8E0001 for ; Wed, 2 Jul 2025 06:57:35 -0400 (EDT) Received: from smtpin25.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay06.hostedemail.com (Postfix) with ESMTP id A87401043B0 for ; Wed, 2 Jul 2025 10:57:34 +0000 (UTC) X-FDA: 83619023628.25.B3FD85B Received: from mail-pj1-f44.google.com (mail-pj1-f44.google.com [209.85.216.44]) by imf13.hostedemail.com (Postfix) with ESMTP id AE1F420002 for ; Wed, 2 Jul 2025 10:57:32 +0000 (UTC) Authentication-Results: imf13.hostedemail.com; dkim=pass header.d=linaro.org header.s=google header.b=noTxVuJT; dmarc=pass (policy=none) header.from=linaro.org; spf=pass (imf13.hostedemail.com: domain of naresh.kamboju@linaro.org designates 209.85.216.44 as permitted sender) smtp.mailfrom=naresh.kamboju@linaro.org ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1751453852; a=rsa-sha256; cv=none; b=8PgINCJSkcOFJ1VZ0v6Xiyx83gq/AQBs0i7lAFT33X6+nwPZkVmEIYPcz9yqAPLXAE/BEj iydPX7gG6qWpJDCRRwqNnefq7toRzO8/wXvy/L8nv+2IMEhIKtKGLgRSY46Oq9OIgZp6iu K3SlR1R9Z9bcyde7hPqvmQPHlRtU7dc= ARC-Authentication-Results: i=1; imf13.hostedemail.com; dkim=pass header.d=linaro.org header.s=google header.b=noTxVuJT; dmarc=pass (policy=none) header.from=linaro.org; spf=pass (imf13.hostedemail.com: domain of naresh.kamboju@linaro.org designates 209.85.216.44 as permitted sender) smtp.mailfrom=naresh.kamboju@linaro.org ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1751453852; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=b6PKBJHM32+U13kTLbm72/9WxBHU1Fr1z8urGBn93NA=; b=TdkXykbCe1h23zIbTKJia14gf2lyz42/AF/QJp/6iQtRkop0RKakgybzuYTvM3Wy6OZTZ2 0z8IdRjyoL4nLraRyvpi1FObEwzlNXG9U1D4Bq08TBYsAUuVlUmDQ3kWEHFV9oyNPv6lpu 4+iSgdXojWsJhpbwuX/16Brr/A9D4Y4= Received: by mail-pj1-f44.google.com with SMTP id 98e67ed59e1d1-3139027b825so2874423a91.0 for ; Wed, 02 Jul 2025 03:57:32 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; t=1751453851; x=1752058651; darn=kvack.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=b6PKBJHM32+U13kTLbm72/9WxBHU1Fr1z8urGBn93NA=; b=noTxVuJTskGUC8sx0MEsZt3ZGks3KOplZ9TDRLfOex2R37esfmkzAxXMm9B5n2PKYj hI5mpoGmMf5Q7umAetbeXZ0J38TtMkeamf5chcy1udTAVyvlKdWgBuaVlDZXxgylKdbE Fe2avfhDoF/BEA7eKy7IweXXTt1R9HI0c6znfrd8dQuZyV2x1O1z7dlbcykqcbXY4dpk KIwDfWo5AdmMms05jnRT+cuJSIbBqQlBNP0kAsk6+XmoRK625mCBwxzvcMEQqlah0kPk 3FxBDHXZaOksmX4MXZuEB1jcJRorNqsp+aj0WOeMVoiLHLMhgwZ8QitBPzyTQFFGaQl3 02SA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1751453851; x=1752058651; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=b6PKBJHM32+U13kTLbm72/9WxBHU1Fr1z8urGBn93NA=; b=TLm2KLBoGjFPrOwZqm8AoQmYZlFGx7bLYN80FObTAG6lIaSOHB6Fs0hPm9wpKwOsxn 4lMdXaUa9ZrV1bXrsrd5HBgThLquqtL2US9SgCnzmG6P8XBdubTsh2DBBQHI6qhvY83z zMfr/A/bgsxQwYQFng4sTTHdBbM/B2DbxswnKeXIBJ/P28knzdqhVoS9n1VyxMT39kZH iMR0OXGEzxycZTPro0BY0otrYKshdAUy1Y2ygVLLpwS20ZdnkRdaTzBJJEOd4cZvXbjI OV5VkjH+eW7Gol0pwyGKsGNPfnigfqfTvrEVPVFXV8VFIinLKVwwvNMiXedfATVxOEEM KQpQ== X-Forwarded-Encrypted: i=1; AJvYcCUpfSdJnMPSrvqv5GBTYqwTSyPSxyJYbSCAEvC0Y0RnOS2eEddQaYQCBZSb2961IGvnZEHIkYgXiQ==@kvack.org X-Gm-Message-State: AOJu0YzOa9jrgdWHHQfaIyTN5tRdGvLSHDlJrdaUj7RmlLbPIRtT+3Ez iBuqhF/kJRAi9cOvnZUHBZkA8OaYCRLWIMuCG5dNv//v58TS27jqRDfqxLS1SFQKU/JO0Xgp5AE lXycySdpzvasMH1z7jApcWVnRYM8xfX6FZBtTZReRpA== X-Gm-Gg: ASbGncsTm+WGpiMTfN9qL3XVLKbNZ4tCwyl8dnb0m2aQ/NgjwVL6Hb+W6h0aGFjLlZ8 xGbiuWFR5bkd7t9kHt1BmQXU/9nxoCDxtv/QTePQW/5jJvx4JChz90JDch2RmfgshorsDVVdG3m 3XSpHeKiGDszy9DTpC6iWMnJlyW7khrfr9XTRNmssstzzkz/EE9eG66r1DZkOLyERrhQ8ppMBQY yQ14Q== X-Google-Smtp-Source: AGHT+IHyVR0Cut9V8mFqbXLE2gI0SW2klifSUW7QVtX8auO8xvXiA0Ua6n3KwVaWcVGV93VWVuS5GiOtiXlDQAR0jhE= X-Received: by 2002:a17:90b:3911:b0:311:d05c:936 with SMTP id 98e67ed59e1d1-31a90be7e20mr3974942a91.17.1751453851355; Wed, 02 Jul 2025 03:57:31 -0700 (PDT) MIME-Version: 1.0 References: In-Reply-To: From: Naresh Kamboju Date: Wed, 2 Jul 2025 16:27:16 +0530 X-Gm-Features: Ac12FXy9AD4tjHYjA6dhnGK0F8nyYYQxKfc-3Tlz_e47k_MXctC-n7dZz5AOL10 Message-ID: Subject: Re: next-20250701: qemu-x86_64: BUG unable to handle page fault for address __cpa_flush_tlb To: open list , Linux Regressions , lkft-triage@lists.linaro.org, linux-mm Cc: Andrew Morton , Mike Rapoport , Peter Zijlstra , Dave Hansen , Andy Lutomirski , Dan Carpenter , Arnd Bergmann , Anders Roxell Content-Type: text/plain; charset="UTF-8" X-Rspam-User: X-Rspamd-Server: rspam04 X-Rspamd-Queue-Id: AE1F420002 X-Stat-Signature: 9zhur6a5u5gdksxa51gxrt7stiuxjxuw X-HE-Tag: 1751453852-778021 X-HE-Meta: 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 Fu0W9JQk vpvm2ApAk0dnOo/bYJqrC6Aw8lLjvITbfEfzOtkUuGPdFCG+MeITGPZWdFkNCnbndnitIdvrgpjsyskKcRlVVvGlAGRzLCEOsjC9pgB3H1yn9FNJjxxG/s/KRzvWrV/51pArE9r/hGuWXJsnXm6fJKfWVwczTuvUi1r7JwLETiTjA7ACBoi9HkBzAI3LmbfnSdrK2LhdNns0uVV6s0HzA2d+NegQUPulNqA8/zEq4EjqeG5ThKIa2LyqwuHZxf9jwlQKTG1Kbq/R0zylGxh7bPlcygsQZ6MkoVjNqVoq2x92zyqXwl0PPnqbNsZllQ2/fjgLKEaMohw3cx5s6NPXjT07XIEnfKmLvrAfTW/ikDzmzuXBl0XtJjUlLAtnsjNR4r9mwdcvgKbCYZ9RYtWyjFOErLxV7EOB6bTE6 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: On Wed, 2 Jul 2025 at 11:41, Naresh Kamboju wrote: > > Regressions While booting the next-20250701 Linux kernel on a > qemu-x86_64 virtual machine, a kernel panic is observed due to > a page fault in the __cpa_flush_tlb function. > > Test environments: > - qemu-x86_64 > > Regression Analysis: > - New regression? Yes > - Reproducibility? I need more data (Testing is in progress) > > Boot regression: Linux next-20250701 qemu-x86_64 BUG unable to handle > page fault for address __cpa_flush_tlb > > Reported-by: Linux Kernel Functional Testing > > ## Boot log > <6>[ 0.000000] Linux version 6.16.0-rc4-next-20250701 > (tuxmake@tuxmake) (x86_64-linux-gnu-gcc (Debian 13.3.0-16) 13.3.0, GNU > ld (GNU Binutils for Debian) 2.44) #1 SMP PREEMPT_DYNAMIC @1751364982 > <6>[ 0.000000] Command line: console=ttyS0,115200 rootwait > root=/dev/sda debug verbose console_msg_format=syslog > systemd.log_level=warning rw earlycon > <6>[ 0.000000] x86/CPU: Model not found in latest microcode list > <6>[ 0.000000] BIOS-provided physical RAM map: > > ... > > <6>[ 2.292682] EXT4-fs (sda): mounted filesystem > 9c9bd7ea-a7a4-4c7c-bc54-7007f029c954 r/w with ordered data mode. Quota > mode: none. > <6>[ 2.294012] VFS: Mounted root (ext4 filesystem) on device 8:0. > <6>[ 2.296792] devtmpfs: mounted > <6>[ 2.387406] Freeing unused kernel image (initmem) memory: 4092K > <6>[ 2.389312] Write protecting the kernel read-only data: 32768k > <6>[ 2.391640] Freeing unused kernel image (text/rodata gap) memory: 28K > <1>[ 2.393647] BUG: unable to handle page fault for address: 000000000002aa97 > <1>[ 2.394089] #PF: supervisor read access in kernel mode > <1>[ 2.395026] #PF: error_code(0x0000) - not-present page > <6>[ 2.395623] PGD 0 P4D 0 > <4>[ 2.396063] Oops: Oops: 0000 [#1] SMP PTI > <4>[ 2.396998] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Not tainted > 6.16.0-rc4-next-20250701 #1 PREEMPT(voluntary) > <4>[ 2.397726] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), > BIOS 1.16.3-debian-1.16.3-2 04/01/2014 > <4>[ 2.398454] RIP: 0010:__cpa_flush_tlb > (arch/x86/mm/pat/set_memory.c:320 arch/x86/mm/pat/set_memory.c:408) > <4>[ 2.399219] Code: 1e fa 0f 1f 44 00 00 55 48 89 e5 41 54 53 48 83 > 7f 20 00 48 89 fb 74 5b 45 31 e4 31 ff eb 27 48 8b 13 a8 02 75 47 48 > c1 e7 0c <48> 03 3a 48 01 ff 48 d1 ff e8 26 f4 ff ff 41 8d 7c 24 01 49 > 89 fc > All code > ======== > 0: 1e (bad) > 1: fa cli > 2: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) > 7: 55 push %rbp > 8: 48 89 e5 mov %rsp,%rbp > b: 41 54 push %r12 > d: 53 push %rbx > e: 48 83 7f 20 00 cmpq $0x0,0x20(%rdi) > 13: 48 89 fb mov %rdi,%rbx > 16: 74 5b je 0x73 > 18: 45 31 e4 xor %r12d,%r12d > 1b: 31 ff xor %edi,%edi > 1d: eb 27 jmp 0x46 > 1f: 48 8b 13 mov (%rbx),%rdx > 22: a8 02 test $0x2,%al > 24: 75 47 jne 0x6d > 26: 48 c1 e7 0c shl $0xc,%rdi > 2a:* 48 03 3a add (%rdx),%rdi <-- trapping instruction > 2d: 48 01 ff add %rdi,%rdi > 30: 48 d1 ff sar $1,%rdi > 33: e8 26 f4 ff ff call 0xfffffffffffff45e > 38: 41 8d 7c 24 01 lea 0x1(%r12),%edi > 3d: 49 89 fc mov %rdi,%r12 > > Code starting with the faulting instruction > =========================================== > 0: 48 03 3a add (%rdx),%rdi > 3: 48 01 ff add %rdi,%rdi > 6: 48 d1 ff sar $1,%rdi > 9: e8 26 f4 ff ff call 0xfffffffffffff434 > e: 41 8d 7c 24 01 lea 0x1(%r12),%edi > 13: 49 89 fc mov %rdi,%r12 > <4>[ 2.399698] RSP: 0000:ffffb316c00e0f78 EFLAGS: 00010046 > <4>[ 2.400494] RAX: 0000000000000169 RBX: ffffb316c0013e30 RCX: > ffffb316c0013e30 > <4>[ 2.401577] RDX: 000000000002aa97 RSI: 000000008b09dcbb RDI: > 0000000000000000 > <4>[ 2.401910] RBP: ffffb316c00e0f88 R08: 000000000000546c R09: > 0000000000000000 > <4>[ 2.402961] R10: 0000000000000000 R11: ffffb316c00e0ff8 R12: > 0000000000000000 > <4>[ 2.403326] R13: ffff8e357bd2daa0 R14: ffff8e3500aaaeb8 R15: > ffffffff95148f50 > <4>[ 2.403927] FS: 0000000000000000(0000) > GS:ffff8e35e47bc000(0000) knlGS:0000000000000000 > <4>[ 2.404471] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 > <4>[ 2.404795] CR2: 000000000002aa97 CR3: 000000002ac48000 CR4: > 00000000000006f0 > <4>[ 2.405623] Call Trace: > <4>[ 2.406562] > <4>[ 2.407678] __flush_smp_call_function_queue > (arch/x86/include/asm/jump_label.h:36 include/trace/events/csd.h:64 > kernel/smp.c:135 kernel/smp.c:540) > <4>[ 2.408101] generic_smp_call_function_single_interrupt (kernel/smp.c:458) > <4>[ 2.408234] __sysvec_call_function_single > (arch/x86/include/asm/jump_label.h:36 > arch/x86/include/asm/trace/irq_vectors.h:98 arch/x86/kernel/smp.c:272) > <4>[ 2.409077] sysvec_call_function_single (arch/x86/kernel/smp.c:266 > (discriminator 35) arch/x86/kernel/smp.c:266 (discriminator 35)) > <4>[ 2.409287] > <4>[ 2.409408] > <4>[ 2.409584] asm_sysvec_call_function_single > (arch/x86/include/asm/idtentry.h:709) > <4>[ 2.410108] RIP: 0010:pv_native_safe_halt (arch/x86/kernel/paravirt.c:82) > <4>[ 2.410323] Code: 1f 84 00 00 00 00 00 0f 1f 40 00 90 90 90 90 90 > 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa eb 07 0f 00 2d 85 ef 03 > 00 fb f4 cc cc cc cc 66 2e 0f 1f 84 00 00 00 00 00 66 90 90 90 90 > 90 90 > All code > ======== > 0: 1f (bad) > 1: 84 00 test %al,(%rax) > 3: 00 00 add %al,(%rax) > 5: 00 00 add %al,(%rax) > 7: 0f 1f 40 00 nopl 0x0(%rax) > b: 90 nop > c: 90 nop > d: 90 nop > e: 90 nop > f: 90 nop > 10: 90 nop > 11: 90 nop > 12: 90 nop > 13: 90 nop > 14: 90 nop > 15: 90 nop > 16: 90 nop > 17: 90 nop > 18: 90 nop > 19: 90 nop > 1a: 90 nop > 1b: f3 0f 1e fa endbr64 > 1f: eb 07 jmp 0x28 > 21: 0f 00 2d 85 ef 03 00 verw 0x3ef85(%rip) # 0x3efad > 28: fb sti > 29: f4 hlt > 2a:* c3 ret <-- trapping instruction > 2b: cc int3 > 2c: cc int3 > 2d: cc int3 > 2e: cc int3 > 2f: 66 2e 0f 1f 84 00 00 cs nopw 0x0(%rax,%rax,1) > 36: 00 00 00 > 39: 66 90 xchg %ax,%ax > 3b: 90 nop > 3c: 90 nop > 3d: 90 nop > 3e: 90 nop > 3f: 90 nop > > Code starting with the faulting instruction > =========================================== > 0: c3 ret > 1: cc int3 > 2: cc int3 > 3: cc int3 > 4: cc int3 > 5: 66 2e 0f 1f 84 00 00 cs nopw 0x0(%rax,%rax,1) > c: 00 00 00 > f: 66 90 xchg %ax,%ax > 11: 90 nop > 12: 90 nop > 13: 90 nop > 14: 90 nop > 15: 90 nop > <4>[ 2.411151] RSP: 0000:ffffb316c00abea0 EFLAGS: 00010206 > <4>[ 2.411522] RAX: ffff8e35e47bc000 RBX: ffff8e3500372e80 RCX: > 0000000000000001 > <4>[ 2.411691] RDX: ffffffff9523177d RSI: ffffffff96b9a3df RDI: > 0000000000005464 > <4>[ 2.412619] RBP: ffffb316c00abea8 R08: 0000000000005464 R09: > 0000000000000001 > <4>[ 2.412810] R10: 0000004d8989ef00 R11: 000000000548e0b3 R12: > 0000000000000001 > <4>[ 2.413067] R13: 0000000000000000 R14: 0000000000000000 R15: > 0000000000000000 > <4>[ 2.413403] ? do_idle (kernel/sched/idle.c:191 kernel/sched/idle.c:330) > <4>[ 2.413737] ? default_idle (arch/x86/include/asm/paravirt.h:107 > arch/x86/kernel/process.c:757) > <4>[ 2.413926] arch_cpu_idle (arch/x86/kernel/process.c:795) > <4>[ 2.414072] default_idle_call (include/linux/cpuidle.h:144 > kernel/sched/idle.c:123) > <4>[ 2.414608] do_idle (kernel/sched/idle.c:191 kernel/sched/idle.c:330) > <4>[ 2.414744] cpu_startup_entry (kernel/sched/idle.c:427) > <4>[ 2.414961] start_secondary (arch/x86/kernel/smpboot.c:203 > (discriminator 10) arch/x86/kernel/smpboot.c:283 (discriminator 10)) > <4>[ 2.415531] common_startup_64 (arch/x86/kernel/head_64.S:419) > <4>[ 2.415720] > <4>[ 2.415898] Modules linked in: > <4>[ 2.416303] CR2: 000000000002aa97 > <4>[ 2.417490] ---[ end trace 0000000000000000 ]--- > <4>[ 2.417940] RIP: 0010:__cpa_flush_tlb > (arch/x86/mm/pat/set_memory.c:320 arch/x86/mm/pat/set_memory.c:408) > <4>[ 2.418250] Code: 1e fa 0f 1f 44 00 00 55 48 89 e5 41 54 53 48 83 > 7f 20 00 48 89 fb 74 5b 45 31 e4 31 ff eb 27 48 8b 13 a8 02 75 47 48 > c1 e7 0c <48> 03 3a 48 01 ff 48 d1 ff e8 26 f4 ff ff 41 8d 7c 24 01 49 > 89 fc > All code > ======== > 0: 1e (bad) > 1: fa cli > 2: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) > 7: 55 push %rbp > 8: 48 89 e5 mov %rsp,%rbp > b: 41 54 push %r12 > d: 53 push %rbx > e: 48 83 7f 20 00 cmpq $0x0,0x20(%rdi) > 13: 48 89 fb mov %rdi,%rbx > 16: 74 5b je 0x73 > 18: 45 31 e4 xor %r12d,%r12d > 1b: 31 ff xor %edi,%edi > 1d: eb 27 jmp 0x46 > 1f: 48 8b 13 mov (%rbx),%rdx > 22: a8 02 test $0x2,%al > 24: 75 47 jne 0x6d > 26: 48 c1 e7 0c shl $0xc,%rdi > 2a:* 48 03 3a add (%rdx),%rdi <-- trapping instruction > 2d: 48 01 ff add %rdi,%rdi > 30: 48 d1 ff sar $1,%rdi > 33: e8 26 f4 ff ff call 0xfffffffffffff45e > 38: 41 8d 7c 24 01 lea 0x1(%r12),%edi > 3d: 49 89 fc mov %rdi,%r12 > > Code starting with the faulting instruction > =========================================== > 0: 48 03 3a add (%rdx),%rdi > 3: 48 01 ff add %rdi,%rdi > 6: 48 d1 ff sar $1,%rdi > 9: e8 26 f4 ff ff call 0xfffffffffffff434 > e: 41 8d 7c 24 01 lea 0x1(%r12),%edi > 13: 49 89 fc mov %rdi,%r12 > <4>[ 2.418856] RSP: 0000:ffffb316c00e0f78 EFLAGS: 00010046 > <4>[ 2.419172] RAX: 0000000000000169 RBX: ffffb316c0013e30 RCX: > ffffb316c0013e30 > <4>[ 2.419363] RDX: 000000000002aa97 RSI: 000000008b09dcbb RDI: > 0000000000000000 > <4>[ 2.419552] RBP: ffffb316c00e0f88 R08: 000000000000546c R09: > 0000000000000000 > <4>[ 2.419864] R10: 0000000000000000 R11: ffffb316c00e0ff8 R12: > 0000000000000000 > <4>[ 2.420309] R13: ffff8e357bd2daa0 R14: ffff8e3500aaaeb8 R15: > ffffffff95148f50 > <4>[ 2.420816] FS: 0000000000000000(0000) > GS:ffff8e35e47bc000(0000) knlGS:0000000000000000 > <4>[ 2.421298] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 > <4>[ 2.421675] CR2: 000000000002aa97 CR3: 000000002ac48000 CR4: > 00000000000006f0 > <0>[ 2.422354] Kernel panic - not syncing: Fatal exception in interrupt > <0>[ 2.425278] Kernel Offset: 0x13e00000 from 0xffffffff81000000 > (relocation range: 0xffffffff80000000-0xffffffffbfffffff) > <0>[ 2.426205] ---[ end Kernel panic - not syncing: Fatal exception > in interrupt ]--- > > ## Source > * Kernel version: 6.16.0-rc4-next-20250701 > * Git tree: https://kernel.googlesource.com/pub/scm/linux/kernel/git/next/linux-next.git > * Git sha: 3f804361f3b9af33e00b90ec9cb5afcc96831e60 > * Git describe: 6.16.0-rc4-next-20250701 > * Architectures: arm64 > * Toolchains: gcc-13 > * Kconfigs: gcc-13-lkftconfig-no-kselftest-frag > > ## Build arm64 > * Test log: https://qa-reports.linaro.org/api/testruns/28972335/log_file/ My bad, Please ignore the below link (It is for a different regression) > * Test LAVA log 1: > https://lkft.validation.linaro.org/scheduler/job/8336872#L5891 > * Test details: > https://regressions.linaro.org/lkft/linux-next-master/next-20250701/log-parser-boot/panic-multiline-kernel-panic-not-syncing-fatal-exception-in-interrupt/ > * Build link: https://storage.tuxsuite.com/public/linaro/lkft/builds/2zGk2ZJWqj1Ukob9bJAF1Jn6uK8/ > * Kernel config: > https://storage.tuxsuite.com/public/linaro/lkft/builds/2zGk2ZJWqj1Ukob9bJAF1Jn6uK8/config > > -- > Linaro LKFT > https://lkft.linaro.org